Distributed Greedy Approximation to Maximum

Distributed Greedy Approximation to Maximum Weighted
Independent Set for Scheduling with Fading Channels
Changhee Joo
Xiaojun Lin
Jiho Ryu
ECE, UNIST
UNIST-gil 50
Ulsan, South Korea
ECE, Purdue University
465 Northwestern Ave.
West Lafayette, IN
47907-2035
ECE, UNIST
UNIST-gil 50
Ulsan, South Korea
[email protected]
[email protected]
Ness B. Shroff
[email protected]
ECE and CSE, OSU
2015 Neil Ave.
Columbus, OH 43210
[email protected]
ABSTRACT
Categories and Subject Descriptors
Developing scheduling mechanisms that can simultaneously
achieve throughput optimality and good delay performance
often require solving the Maximum Independent Weighted
Set (MWIS) problem. However, under most realistic network settings, the MWIS problem can be shown to be NPhard. In non-fading environments, low-complexity scheduling algorithms have been provided that converge either to
the MWIS solution in time or to a solution that achieves
at least a provable fraction of the achievable throughput.
However, in more practical systems the channel conditions
can vary at faster time-scales than convergence occurs in
these lower-complexity algorithms. Hence, these algorithms
cannot take advantage of the opportunistic gain, and may
no longer guarantee good performance. In this paper, we
propose a low-complexity scheduling scheme that performs
provably well under fading channels and is amenable to implement in a distributed manner. To the best of our knowledge, this is the first scheduling scheme under fading environments that requires only local information, has a low
complexity that grows logarithmically with the network size,
and achieves provable performance guarantees (which is arbitrarily close to that of the well-known centralized Greedy
Maximal Scheduler). Through simulations we verify that
both the throughput and the delay under our proposed distributed scheduling scheme are close to that of the optimal
solution to MWIS. Further, we implement a preliminary version of our algorithm in a testbed by modifying the existing
IEEE 802.11 DCF. The preliminary experiment results show
that our implementation successfully accounts for wireless
fading, and attains the opportunistic gains in practice, and
hence substantially outperforms IEEE 802.11 DCF.
C.2.1 [Network Architecture and Design]: Wireless communication; G.2.2 [Graph Theory]: Network problems
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
MobiHoc’13, July 29–August 1, 2013, Bangalore, India.
Copyright is held by the owner/author(s). Publication rights licensed to ACM.
Copyright 2013 ACM 978-1-4503-2193-8/13/07 ...$15.00.
Keywords
Distributed algorithm, wireless scheduling, maximum weighted
independent set
1. INTRODUCTION
Scheduling is one of the most fundamental functionalities
of wireless networks. It determines which links should transmit at what time and at what data rate. It is well-known
that solving the scheduling problem is inherently difficult because the interference relationship is often non-convex and
even combinatorial in nature. Further, for large networks it
is imperative that the scheduling algorithm is of low complexity and can be implemented in a fully distributed manner. Such requirements make it highly challenging to design
easy-to-implement scheduling algorithms.
In the literature, it is well-known that the so-called MaxWeight
algorithm is throughput optimal [27]. For graph based interference models, where whether two links interfere or not can
be specified by a binary parameter, the MaxWeight algorithm corresponds to the solution to a Maximum Weighted
Independent Set (MWIS) problem in the conflict (or interference) graph as follows. In the conflict graph, each link is
mapped onto a vertex and two vertices (links) that interfere
with each other are connected by an edge. A set of nonconnected vertices, which is called an independent set, can
transmit data simultaneously. Further, each vertex of the
conflict graph is given a weight, which is typically the product of the link rate and its queue length, and which varies
across time due to changing queue lengths and time-varying
channels. The MaxWeight algorithm then computes an independent set that has the largest total weight (i.e., solution
to the MWIS problem). Although the MaxWeight algorithm
is throughput optimal, the MWIS problem is NP-Hard in
general [13]. Hence, the MaxWeight algorithm incurs high
complexity, and further, it is a centralized algorithm that requires global information. Thus, the MaxWeight algorithm
is not amenable to practical implementation.
In the literature, there have been many efforts to develop
low-complexity and distributed scheduling algorithms with
provably good throughput performance [6,8,11,12,14,16,17,
20,21,23]. These algorithms differ in terms of their throughput guarantee, complexity, and delay performance. They
can be classified into two categories, depending on whether
or not they account for channel fading.
There have been many more scheduling solutions for wireless systems without fading. Low-complexity scheduling algorithms have been developed with complexity that grows
significantly slower than the network size, and can yet guarantee a non-negligible fraction of the optimal system capacity. As a point of comparison, the Greedy Maximal Scheduling (GMS) algorithm (also known as Longest Queue First
(LQF) algorithm) can provably attain a fraction of the optimal capacity, with complexity that grows linearly with the
total number of links L [5]. Other algorithms can reduce the
complexity even further. For example, the Maximal Schedul1
ing algorithm can attain at least ∆
of the optimal capacity,
with O(log N ) complexity [29], where ∆ denotes the maximum conflict degree (see (2) for the definition) and N denotes the number of nodes. The Constant-time scheduling
algorithms, instead, can achieve a comparable capacity with
O(1) complexity, i.e., the complexity does not grow with the
network size [17]. Further, both the Pick-and-Compare algorithm [6,21] and Carrier Sensing Multiple Access (CSMA)
algorithm [11, 23] have been shown to achieve the optimal
throughput. They incur O(L) and O(1) complexity, respectively. We note that these two algorithms have been observed to lead to poor delay performance [8, 20], and hence
the utility of the throughput gain may be debatable, especially for delay-sensitive applications. Nonetheless, these
results indicate that good throughput performance may be
attained for non-fading environments using algorithms with
very low complexity.
In practice, however, most wireless systems experience
some level of channel fading. When link rates vary across
time due to fading, the system throughput can be further improved by scheduling links when their rate are high. This is
known as the opportunistic gain [19]. Exploiting opportunistic gain has been extremely popular in cellular systems. For
ad hoc wireless networks, the MaxWeight algorithm can exploit this opportunistic gain and in fact achieve the optimal
throughput even with fading. However, many of the lowcomplexity scheduling algorithms described in the previous
paragraph cannot exploit the opportunistic gain, and their
performance in fading environments will be much worse.
Take CSMA and Pick-and-Compare algorithms as examples. They reduce complexity by amortizing the computation across many time-slots, and hence need to take many
iterations to find a close-to-optimal schedule. In fading environments, the link rates could have changed significantly
before these algorithms can find a good schedule. Hence,
they will not be able to exploit the opportunistic gain unless the fading is very slow [30]. Similarly, it appears to
be difficult for the Maximal Scheduling algorithm and the
Constant-time scheduling algorithm to account for channel fading and still guarantee a provable fraction of the
optimal capacity. Recently, there have been a few other
low-complexity schemes that are provably efficient with fading channels. However, they are either limited to singlehop networks [16] or their performance guarantees are much
lower [12].
An exception is perhaps the GMS scheduling algorithm,
which computes an approximation to the MWIS problem
by choosing the highest weight vertex first, and can guar1
antee ∆
fraction of the optimal capacity in both fading and
non-fading environment. Other greedy approximations have
also been proposed in [24, 28]. However, they require centralized operations and linear complexity O(L). Although
distributed greedy approximation algorithms have been developed [4, 10], they still incur a worst case time-complexity
of O(L). This high complexity has become a major obstacle preventing these algorithms from being used in practical system because the channel conditions can vary at faster
time-scales than O(L). Given that fading is a prevalent phenomenon in most modern wireless systems, an interesting
open question is how one can develop distributed scheduling
algorithms with even lower complexity and yet guarantee
good performance .
In this paper, we answer this open question by proposing a
novel low-complexity and distributed greedy approximation
algorithm, called DistGreedy, for both fading and non-fading
environments. In contrast to the known greedy approximations [4, 10, 24, 28], our proposed DistGreedy algorithm incurs a low logarithmic complexity O(log L) that grows slowly
with the network size. Further, it requires only local information (such as queue length and link rates of neighboring links), and can be implemented in a distributed fashion.
We analytically show that our low-complexity distributed
1
-approximation
algorithm produces a schedule that is a ∆
to the MWIS problem, and show through simulations that
DistGreedy often achieves scheduling performance far better than the provable bounds. Indeed, it empirically achieves
throughput and delay performance that is close to that of the
MaxWeight scheduler. We also conduct preliminary experiments with implementation in a real testbed. We implement
a new MAC protocol that captures the essence of DistGreedy
by modifying the IEEE 802.11 DCF. Performance comparison with the IEEE 802.11 DCF under channel fading shows
that the DistGreedy algorithm can exploit the opportunistic
gains and thus substantially outperform IEEE 802.11 DCF
in fading environments.
The rest of the paper is organized as follows. The system
model is described in Section 2. The DistGreedy algorithm
is proposed and analyzed in Section 3. We numerically evaluate its performance in Section 4, and provide preliminary
experiment results based on a testbed implementation in
Section 5. Then, we conclude.
2. SYSTEM MODEL
We consider a wireless network with N nodes and L directed links. We assume that time is slotted and that a
single frequency channel is shared by all the links. Multiple
link transmissions at the same time slot may fail due to wireless interference. We assume that there is no link error, i.e.,
a link transmission is successful if there is no simultaneous
interfering transmission.
The link rate of a successful transmission depends on its
channel state. We assume that the channel state is fixed
during a time slot, and changes across time slots. We denote
the (global) channel state by h. when the channel is in state
h, link l can transfer rlh unit of data if its transmission is
successful. Let H denote the set of all the channel states.
We assume that the channel state
Phas a finite space with a
stationary distribution π h , with h∈H π h = 1.
In order to account for wireless fading, we employ a channelh
dependent interference model as follows. Let Ckl
∈ {0, 1}
denote the interference relationship between link k and link
h
l when the channel state is h. We set Ckl
= 0 if link l does
not interfere with link k (and therefore they can transmit
h
simultaneously), and Ckl
= 1, otherwise. We assume that
h
h
the interference relationship is symmetric, i.e., Ckl
= Clk
.
We note that the dependency on h represents a major departure from existing works for non-fading environments.
Specifically, the interference relationship as well as the link
rate may change across time in our model. This model is
not only a simplified version that captures the fundamental characteristics of the more accurate SINR interference
model [9], but also a general model that includes many interference models used in the literature to model FH-CDMA,
Bluetooth, and IEEE 802.11 DCF network systems [25, 29],
as special cases.
Given a network system, our interference model admits a
unique conflict graph at each channel state h, which clearly
presents the underlying interference constraints. For each
link l ∈ L, we draw a vertex in the conflict graph, which is
also denoted by the same alphabet l. For every two vertices
h
k, l with Ckl
= 1, we connect them with an edge in the
conflict graph. Let Gh = (V, E h ) denote the conflict graph
with the set V of vertices and the set E h of edges under
channel state h. The conflict graph explicitly shows the
interference relationship of any two vertices (i.e., links in the
original network). In the sequel, we deal with the conflict
graph throughout the paper.
We now formally formulate the Maximum Weighted Independent Set (MWIS) problem. Suppose that the channel
state is h at time slot t. We consider the conflict graph Gh
constructed from the interference constraints under channel
state h. We begin with some definitions. Vertex x is a neighbor of vertex v, if they are connected by an edge in the conflict graph. Let I h (v) denote the set of neighbors of vertex v
including v, and let I h (A) denote the set of neighbors of vertices in A, i.e., I h (A) := ∪v∈A I h (v). Let wv (t, h) denote a
weight associated with vertex v. In particular, we define the
weight of vertex v as the product of queue length Qv (t) and
transmission rate rvh . Let w∗ (t, h) denote the largest weight,
i.e., w∗ (t, h) := maxv∈V wv (t, h). Further, let w̄v (X; t, h)
denote the largest weight in the neighborhood of vertex v
within X, i.e., w̄v (X; t, h) := maxx∈X∩I h (v) wx (t, h).
We say that a set S of vertices is an independent set (or
a feasible schedule) if no two vertices in the set are neighbors. Further, an independent set is maximal if no extra
vertex can be added. Such an independent set is also called
a maximal matching. Let Sh denote the collection of all
the feasible independent sets that are available in Gh . The
MWIS problem can be formulated as finding S ∗ such that
X
S ∗ ∈ argmax
wv (t, h).
(1)
S∈Sh
v∈S
It has been known that at each time t, given a channel state
h, the solution to the MWIS problem with weight wv (t, h) =
Qv (t)·rvh results in a throughput-optimal MaxWeight scheduling scheme [22]. However, due to the high computational
complexity and the requirement of global information, such
a MaxWeight algorithm is difficult to implement in practice. On the other hand, it has been shown in [15, 18] that
an imperfect scheduling solution that solves (1) within a factor of γ at every time t achieves at least γ fraction of the
optimal throughput. To this end, our goal is to develop practical low-complexity scheduling algorithm that can approximately solve (1) with a provable fraction in a distributed
fashion.
Remarks: In the above MaxWeight scheduling scheme, we
implicitly assume single-hop traffic, i.e., packets are transmitted over a single link and leave the system immediately
after the transmission. For multi-hop traffic, the same MaxWeight
algorithm can be used by replacing the queue length with a
queue differential. (See [27] for the details.) Similarly, our
DistGreedy algorithm described in the next section can be
extended to multi-hop scenarios in a straightforward manner.
Finally, we define the vertex degree δ(h) := maxv∈V |I h (v)|,
where | · | denotes the cardinality of the set, and the maximum conflict (or interference) degree ∆(h) as
∆(h) := max |I h (v) ∩ S|.
v∈V,S∈S
(2)
In the network, the maximum conflict degree represents the
maximum number of simultaneous transmissions in the neighborhood of any link, which can be upper bounded by a constant in many practical interference models [7, 9]. Also, we
define ∆∗ = maxh∈H ∆(h).
3. DISTRIBUTED GREEDY APPROXIMATION
In this section, we describe our distributed approximate
solution to (1) and analyze its performance. We emphasize
that the algorithm operates in a distributed manner and
each vertex (link) requires only local information from its
neighbors in the conflict graph. Throughout this section, we
consider the conflict graph Gh at time t under channel state
h, and omit the subscripts t and h if there is no confusion.
3.1 Algorithm description
We assume that each time slot has two parts: contention
and transmission. The contention part has several intervals,
and each interval is further divided into mini-slots. We determine a feasible schedule during the contention part, and
with the computed schedule, transmits actual data during
the transmission part.
At a time slot, let B denote the feasible schedule (independent set of vertices) chosen by our algorithm. We explain
our solution, starting with an empty set and add vertices
to B by executing an iterative algorithm as shown in Algorithm 1.
At each interval i, some vertices are ‘determined’ as to
whether they belong to set B or not. Specifically, vertices in
Bi are ‘determined’ to be in B at interval i, and vertices in
(I(Bi )\Bi ) are ‘determined’ not to be in B at interval i. Let
Vi denote the set of vertices that have not been determined
yet at the beginning of interval i, i.e.,
Vi := V \ ∪i−1
j=1 I(Bj ) ,
which can be rewritten in a recursive form as
Vi = Vi−1 \I(Bi−1 ).
We say that a vertex in Vi is eligible at interval i. Let Ai ⊂ Vi
denote the set of vertices that will be ‘determined’ during
interval i, from which we will compute Bi . We will soon
see how to find Ai and Bi . From the definitions, it is clear
Algorithm 1 DistGreedy algorithm.
V0 ← V , B0 ← ∅
1: for i = 1 to logα β|V | do
2:
Vi ← Vi−1 \I(Bi−1 )
3:
Ai ← ∅
4:
for each v ∈ Vi do
5:
calculate w̄v (Vi ) := maxx∈Vi ∩I(v) wx
6:
if wv ≥ w̄vα(Vi ) then
7:
Ai ← Ai ∪ {v}
8:
end if
9:
end for
10:
Bi ← dist maximal matching(Ai )
11: end for
X
W*
L1
X
W*/a
L2
X
W*/a2
L3
*
3
W /a
Ĕ...
A1
that V0 = V and B0 = ∅. Finally, we have a couple of
configuration parameters α, β that will be explained later.
The algorithm can be described as follows. We start with
the entire set of vertices V0 = V and an empty set B0 = ∅.
Suppose that each vertex v knows its neighbors’ weights.
In wireless networks, this can be obtained by piggybacking/overhearing the information exchange or by explicitly
exchanging control messages.
1. At each interval i, the set of eligible vertices Vi is updated by excluding I(Bi−1 ) from Vi−1 (line 2 in Algorithm 1), where Bi−1 denotes the set of vertices that
are chosen during interval i−1 and I(Bi−1 ) denotes the
set of neighbors for Bi−1 (including Bi−1 itself). For
this purpose, each vertex that belongs to Bi−1 should
notify its neighbors by broadcasting a control message
during interval i − 1. (See Step 4 below.)
2. Each vertex v in Vi calculates its local maximum weight
w̄v (Vi ) := maxx∈Vi ∩I(v) wx from the weight information of its neighbors (in Vi ). Then each vertex v sets
itself as one of Ai if wv ≥ w̄v (Vi )/α, where α > 1.
(Lines 5 − 8.)
3. On the set Ai , we compute a maximal matching in a
distributed manner (line 10), which requires O(δ log2 |V |)
complexity [26] or O(δ) complexity with precomputation [14], where δ is the vertex degree. Let Bi denotes
the obtained set.
4. In the process of computing the maximal matching,
each neighbor of vertex v ∈ Bi should be informed
that v belongs to Bi . Hence, the vertices in I(Bi ) will
not participate in the next interval.
5. The above procedure repeats for J times, where J :=
⌈logα β|V |⌉. The set B(= ∪i Bi ) of vertices will be
returned as the final result. This is the set of links
that will transmit data packets during the time slot.
We have two configuration parameters α and β that will be
further discussed in the next section.
Note that our distributed greedy (DistGreedy) algorithm
requires O(δ) complexity at each interval and will run for
O(log |V |) intervals (using the algorithm in [14]). Hence,
the worst-case complexity will be O(δ log |V |). In some applications, e.g., regular topologies, δ is a fixed constant.
Thus, DistGreedy can be implemented with O(log |V |) complexity (or with polylogarithmic complexity in random net-
X
B1
X S*
V2=V1\I(B1)
Figure 1: Conflict graph with vertices and edges in
the layered format, where vertices are partitioned
into layers according to their weights.
works1 ), which is much lower than the O(|V |) complexity of
the known distributed implementation of GMS [4, 10].
Remarks: Note that the previous greedy approximations
to the MWIS problem shown in [24] have a similar iterative
procedure as DistGreedy. However, their algorithm works
vertex-by-vertex sequentially, which results in linear complexity in the worst case (e.g., consider a ring topology such
that, starting from a link, the link weights decrease in a
clockwise direction). Further, they have a different rule for
selecting a vertex at each interval, e.g.,P
they select vertex v
wv
wx
with the largest |Vi ∩I(v)|
or with wv ≥ x∈Vi ∩I(v) |Vi ∩I(x)|
.
This selection rule is the key to achieve the provable approximation ratio of 1δ . Unlike this previous work [24], DistGreedy reduces the complexity significantly by considering
multiple vertices in parallel and do not follow the strict sequential ordering. Further, the procedure stops after a certain number of intervals. At each interval, DistGreedy selects the vertices v with wv ≥ maxx∈Vi ∩I(v) wx /α. The end
1
result is a much better approximation ratio (≈ ∆
) and a
much better complexity (O(log |V |)). However, the parallel
processing also makes it more difficult to analyze the performance of DistGreedy. Nonetheless, in the next section,
we show that due to the selection rule of DistGreedy, it can
1
.
achieve the approximation ratio arbitrarily close to ∆
3.2 Performance Analysis
We evaluate the performance of our distributed greedy
1
(DistGreedy) algorithm, and show that it is in fact a ∆
approximation to the optimal solution. Motivated by [28],
we divide the vertices into layers L1 , L2 , . . . based on the
ratio of their weight to the maximum weight w∗ , as 2
∗
w∗
w
(3)
Li = v ∈ V i < wv ≤ i−1 .
α
α
1
In random networks, it is well-known that δ ∼ O(log |V |)
to ensure connectivity [9].
2
The algorithm in [28] computes a maximal matching for
each layer, and thus requires for each node to know which
layer it belongs to, or equivalently to know w∗ . However,
knowing the maximum weight w∗ may take O(|V |) time to
propagate in the worst case. In contrast, DistGreedy works
with local weight information and the layering structure is
only for the purpose of analysis.
Fig. 1 illustrates an example conflict graph in the layered
format.
We start our analysis with the following lemmas.
Lemma 1. For i ≤ logα β|V |, if vertex v ∈ Li , then
v ∈ I(∪ij=1 Bj ), and thus
Li ⊂ I(∪ij=1 Bj ).
(4)
Proof. If each vertex v ∈ Li selects itself for distributed
maximal matching no later than the i-th interval, i.e., if
v ∈ Li implies v ∈ ∪ij=1 Aj , then we can obtain the lemma,
since
v ∈ Li ⇒ v ∈ ∪ij=1 Aj ⇒ v ∈ ∪ij=1 I(Bj ) ⇒ v ∈ I(∪ij=1 Bj ),
(5)
where the second step comes from the fact Aj ⊂ I(Bj ), since
Bj is a maximal matching on Aj .
Now what remains to be shown is that v ∈ Li implies
v ∈ ∪ij=1 Aj . We show this by induction. It is clear that
when
i = 1, all vertices v ∈ L1 belong to A1 , because wv >
w∗
.
Suppose
that the statement is true for all i ≤ c. Note
α
that all vertices in ∪cj=1 Aj are not eligible at interval c + 1
since each vertex in Aj belongs to I(Bj ) for j = 1, 2, . . . , c
under our algorithm. Hence, at interval c + 1, no vertex in
∪cj=1 Aj is eligible, which immediately implies that no vertex
in ∪cj=1 Lj is eligible since Li ⊂ ∪ij=1 Aj for all i ≤ c. Now,
if there is a vertex v ∈ Lc+1 eligible at interval c + 1, i.e.,
v ∈ Vc+1 , then vertex v ∗should be included in Ac+1 , since all
vertices e with we > w
(i.e., e ∈ ∪cj=1 Lj ) are not eligible.
αc
Hence, the induction hypothesis must hold for i = c + 1.
This completes the proof.
Lemma 1 states that under DistGreedy, any vertex in layer
Li will be ‘determined’ after interval i ends. In the following lemma, we show that each vertex in layer i must have a
neighboring vertex that has a similar or higher weight and
that is chosen by DistGreedy after interval i ends. Combining these two lemmas, we can show that after interval i,
every vertex in Li or above is a neighbor of a vertex that is
already chosen by DistGreedy.
Lemma 2. For each vertex x ∈ Li (with i ≤ logα β|V |),
there exists v ∈ ∪ij=1 Bj such that x ∈ I(v) and α · wv ≥ wx .
Proof. From Lemma 1, we have x ∈ I(∪ij=1 Bj ), and
thus there exists v ∈ ∪ij=1 Bj such that x ∈ I(v). Let k ≤ i
be the smallest index such that x ∈ I(Bk ). Then, x ∈
/
I(∪k−1
j=1 Bj ) and there exists v ∈ Bk with x ∈ I(v). Since
v ∈ Bk ⊂ Ak , it should satisfy w̄v (Vk )/wv ≤ α from line
6 of Algorithm 1. Also since x ∈ I(v) and x is eligible at
interval k (because x ∈
/ I(∪k−1
j=1 Bj )), we have w̄v (Vk ) ≥ wx .
Hence, we obtain that α · wv ≥ wx .
Recall that S ∗ denotes the maximum weighted independent set over V . We define Di (v) as the set of vertices in
S ∗ ∩ Li that are connected to v by an edge in the conflict
graph, i.e.,
Di (v) := {x | x ∈ S ∗ ∩ Li , and x ∈ I(v)}.
(6)
Then |Di (v)| denotes the number of vertices selected by the
MWIS solution in layer Li that conflicts with v. The following lemma shows that the weight sum for S ∗ within layer
Li can be bounded by the weight sum for the independent
set chosen by DistGreedy up to interval i, multiplied by
α · |Di (v)|.
Lemma 3. At each interval i, we have
X
X
α · |Di (v)| · wv ≥
wx .
(7)
x∈Li ∩S ∗
v∈∪ij=1 Bj
Proof. From Lemma 2, we have that for each vertex
x ∈ S ∗ ∩ Li , there exists v ∈ ∪ij=1 Bj such that x ∈ I(v)
and α · wv ≥ wx . However, multiple x may map to the same
v. Nonetheless, for each of such v, at most |Di (v)| vertices
in S ∗ ∩ Li can potentially be neighbor of v in the conflict
graph. Therefore, we can obtain the result.
By summing both sides of (7) for all i, we can bound
the maximum weight sum by the weight sum of the vertices chosen by DistGreedy within a constant factor α∆.
(See the proof of Lemma 4 below.) However, if we were to
terminate after all vertices are considered, it would have resulted in O(|V |) complexity (e.g., consider a fully connected
1
1
graph with vertices whose weights are 1, α+ǫ
, (α+ǫ)
2 , ...). In
the next lemma, we show that even if DistGreedy stops after O(log |V |) intervals, the performance loss would still be
negligible.
Lemma 4. By setting α → 1 and β sufficiently large,
1
-approximation algorithm.
Algorithm 1 is a ∆(h)
Proof. Let B := ∪Jj=1 Bj , where J := ⌈logα β|V |⌉. By
summing (7) from i = 1 to J, we can obtain that
J
X
X
wx ≤
i=1 x∈Li ∩S ∗
J
X
X
α · |Di (v)| · wv
i=1 v∈∪i
j=1 Bj
≤
J
XX
α · |Di (v)| · wv
(8)
v∈B i=1
≤
X
α · ∆ · wv .
v∈B
Also, for i > J, we can obtain that
∞
X
X
wx ≤
i=J +1 x∈Li ∩S ∗
∞
X
X
wx ≤ |V | ·
i=J +1 x∈Li
w∗
w∗
≤
,
αJ
β
(9)
where w∗ denotes the largest weight among all the vertices.
The last inequality holds since J = ⌈log α β|V |⌉.
Combining (8) and (9), we can obtain that
α∆
X
wv +
v∈B
X
w∗
≥
wx .
β
x∈S ∗
(10)
Thus our result follows.
It has been shown in non-fading environments that a scheduling solution that is a γ-approximation to the MWIS problem
at each time slot can achieve at least γ fraction of the optimal
throughput [15,18]. It is straightforward to extend the result
to fading environment: a scheduling solution that is a γ(h)approximation to the MWIS problem under channel state h
at each time slot can achieve at least minh∈H γ(h) fraction
of the optimal throughput. Combining it with Lemma 4, we
can obtain the following Proposition.
Proposition 5. A scheduling solution that executes DistGreedy at each time slot can achieve ∆1∗ fraction of the optimal throughput, where ∆∗ = maxh∈H ∆(h).
0
1
2
3
10000
=1.1, 33 intervals
=1.5, 7 intervals
8
12
5
9
13
6
10
14
7
11
15
8000
Total queue lengths
4
=2.0, 4 intervals
=2.5, 3 intervals
=3.0, 2 intervals
6000
4000
2000
Figure 2: Grid network topology.
0
0.0
Remarks: In developing a distributed low-complexity GMS
algorithm, one of the main difficulties lies in the requirement
of the strict global ordering of selected vertices. For example, if the conflict graph is a linear graph, where the weights
of vertices monotonically decrease from the left to the right,
then the selection of the right-most vertex v with the smallest weight can be made only after the selection of its left-side
neighbor u, which again can be made only after the selection of the left-side neighbor of vertex u due to the linear
topology. This implies that the selection of the right-most
vertex v needs to be made after O(|V |) time.
Our result implies that the strict global ordering in the
GMS algorithm is not required for high performance. A
loose ordering would be sufficient, which can result in significant complexity reduction with negligible performance
degradation. We highlight that the state-of-the-art “dis1
tributed” ∆(h)
-approximation algorithm requires O(|V |) complexity [4, 10], while our local greedy algorithm significantly
lowers the complexity to O(δ(h) log |V |).
4.
NUMERICAL RESULTS
We evaluate DistGreedy, Greedy, and MaxWeight through
simulations, where MaxWeight is the optimal scheduler that
solves the MWIS problem at each time slot. We simulate
two networks: one with a grid topology and the other with
a randomly generated topology.
We first consider a grid topology as shown in Fig. 2. Each
link has an average transmission rate of one, two, or three
packets per time slot, which are signified in the figures by
the number of lines between two nodes, e.g., one line implies
one packet per time on average. At each time slot, actual
link rate changes and is chosen uniformly at random from
the range [0, 2(Avg. rate)]. Since DistGreedy approximates
the optimal solution to the MWIS problem at each time slot,
we focus on the behavior of DistGreedy under static interference models, where the interference relationship does not
change across time. In particular, we use one-hop (or primary) interference model, under which two links that share
a node cannot transmit at the same time. We impose singlehop traffic of load ρ on every link: at each time slot, each
link has a packet arrival with probability ρ. The arrivals
are i.i.d. across time slots and links. We set DistGreedy to
have ⌈logα β|V |⌉ intervals at each time slot. We use a linkcoloring technique to find a maximal matching, under which
(δ + 1) mini-slots are sufficient [14]. Since δ = 6 in our grid
topology, we use 10 mini-slots at each interval. The number
of mini-slots are not taken into account in the performance
measurements. Each result is an average of 10 simulation
runs for 106 time slots.
0.2
0.4
0.6
0.8
Figure 3: Performance of DistGreedy with different
α.
Fig. 3 illustrates the performance of DistGreedy in terms
of total queue lengths with different α settings and β = 1.
Sharp increases of queue lengths imply the boundary of the
capacity region. Note that a larger α means thicker layers
and thus a smaller number of intervals. The results show
that the performance is not sensitive to the value of α in a
range [1.1, 3] and a small number of intervals (e.g., α = 2.0)
would be sufficient for high throughput performance.
While running DistGreedy, we also trace the maximum
weight sum, the weight sum of the schedule selected by DistGreedy, and the weight sum of the schedule that would be
chosen by Greedy, at each time slot. Fig. 4 depicts the ratio
of each weight sum (from DistGreedy and Greedy) to the
maximum weight sum. It shows that both GMS and DistGreedy typically achieve much higher ratios than the analytical bound, which is 12 in the one-hop interference model
and shown in the figure using a dotted line. Also, as α gets
closer to 1, DistGreedy algorithm approaches Greedy algorithm because layers become narrower and the number of
intervals increases.
In Fig. 5, we compare the performances of MaxWeight,
Greedy, DistGreedy (with α = 2, β = 1), and Q-CSMA,
where Q-CSMA is a CSMA algorithm known to be throughputoptimal in non-fading environments. For Q-CSMA, we use
the version shown in [8], i.e., each link v sets its access prob1
ability for the decision vector to |I(v)|
and sets its weight for
h
link activity to log(Ql (t) · rl (t)). The results in Fig. 5 illustrate that Q-CSMA, which has the lowest complexity O(1)
among the scheduling schemes, has much poor throughput
and delay performance than the others. In particular, its delay grows quickly at an offered load much lower than other
algorithms, which suggests that it is not throughput optimal in fading environments. In contrast, DistGreedy has
similar queue lengths to MaxWeight and Greedy. In other
words, it empirically achieves similar throughput and delay
performance to the optimal. Further, the simulation results
suggest that the actual performance of DistGreedy could
significantly outperforms the analytical lower bounds.
Next we consider a network that is randomly generated.
We place a total of 32 nodes at random within 1×1 area. We
connect two nodes with a link if they are within a distance
of 0.25. Each link has a time-varying link rate, which is
randomly chosen in the range of [0, 10] packets per slot, and
i.i.d. across links and time. We generated single-hop traffic
over 24 links, which are chosen at random. Each source
Ratio of weight sum to the maximum
1.0
502
Client 1
Server
A
510
0.4
Greedy
0.0
0
200
400
600
800
1000
Ratio of weight sum to the maximum
1.0
0.8
0.6
0.4
Greedy
DistGreedy
0.2
0.0
0
200
400
600
800
1000
time
(b) α = 1.1
Figure 4: Ratio of the achieved weight sum to the
maximum weighted sum.
10000
MaxW eight
Greedy
DistGreedy
Total queue lengths
Q-CSMA
6000
4000
2000
0
Figure 5:
schemes.
0.2
0.4
0.6
0.8
Performance comparison of scheduling
injects a random number of packets in the range of [1, 5] at
each time slot, with probability ρ. The results are similar
to the grid network and are omitted due to lack of space.
We can observe that the throughput and delay performance
of DistGreedy are close to those of MaxWeight and Greedy,
even though it has a significantly lower complexity.
5.
B
509
505
507
Client 2
DistGreedy
0.2
(a) α = 2.0
0.0
504
Client 3
0.6
time
8000
503
0.8
PRELIMINARY EXPERIMENT RESULTS
In this section, we provide preliminary experimental results and show that the opportunistic gains of wireless fading can be achieved in practice. We have implemented a
version of DistGreedy in hardware driver by modifying the
medium access control of IEEE 802.11 DCF. Specifically,
we use the ath5k device driver [2] over Voyage Linux [3] installed into the Alix 2D2 system board [1]. We modified it
such that each node maintains information of recent queue
lengths and transmission rates (link capacity) of neighboring nodes, and that a header in the data frame includes the
queue length information of the transmitter. The transmis-
Figure 6: Experiment setup.
sion rate information can also be obtained from the device if
the frame is successfully received. Each node who receives or
overhears the frame updates the queue and rate information
of the transmitter from the header.
Unlike IEEE 802.11 DCF, DistGreedy in Algorithm 1 requires time synchronization between nodes. We avoid the
synchronization overheads by implementing an approximation of our algorithm while capturing the essential feature
of the algorithm. Further, while the DistGreedy scheme
is a link-based algorithm, current implementation of IEEE
802.11 DCF operates on nodes. Due to this difference, we
use wn′ (t) and w̄n′ (t) to denote node n’s weight and its local
maximum weight at time t, respectively. Our DistGreedy
implementation works just like IEEE 802.11 DCF, except
that when the transmitter n has a frame to send (asynchronously with other nodes) at time t, it calculates the local maximum weight w̄n′ (t) from the information that it has
w̄′ (t)
received from its neighbors, and estimates θ := ⌊ α·wn′ (t) ⌋.
n
Then, it chooses the contention window size at random within
[0, 7] if θ = 0, within [0, 31] if θ = 1, within [0, 63] if θ = 2,
and within [0, 127] otherwise3 . In this way, our implementation effectively has four intervals. Moreover, our implementation does not compute a maximal matching, which
reduces the complexity further (compared with Algorithm 1,
line 10). We set α = 10/9, the maximum buffer size to 100
frames, and the IP packet size to 512 bytes. We remark that
finding an optimal number of intervals and the contention
window sizes is an interesting open question but beyond the
scope of the paper.
Fig. 6 shows our experiment setting at the 5th floor of the
ECE department building in UNIST, South Korea. We set
three stationary clients and let each client transmit data at 3
Mbps to the single mobile server. All the clients can overhear
each other’s transmissions. The server moves between two
positions A and B as shown in Fig. 6, at every 60 seconds,
starting from A. Clearly, Client 1 has a good channel state
when the server locates in Position A, and Client 3 performs
well when the server locates in Position B. We conduct our
experiments for 5 minutes and measure transmission rate,
queue lengths, and throughput of each client.
Figs. 7 and 8 illustrate the experiment results. Due to high
measurement variations, we show time-averaged values using
exponential weighted moving average. Figs. 7(a) and 8(a)
show that the variations of the total (average) capacity of
three clients is less than the variations of the transmission
rate of an individual link, which is significant especially when
the server moves. Note that transmission rate of a link has
a discrete value of {6, 9, 12, 24, 36, 48, 56} Mbps. Instantaneous link rate changes very frequently across time though
3
Non-overlapped windows for each θ seems to be a more
intuitive choice. Unfortunately, we are unable to select a
window that starts with non-zero value due to configuration
restriction in our device firmware.
200
120
90
DistGreedy
802.11
60
30
0
10
802.11
DistGreedy
Total throughput (Mbps)
Total queue length (pkts)
Total data rate (Mbps)
150
150
100
50
8
6
4
2
0
0
60
120
180
240
300
DistGreedy
802.11
0
0
60
Time (sec)
120
180
240
300
0
60
Time (sec)
(a) Total transmission rate
120
180
240
300
Time (sec)
(b) Total queue length
(c) Total throughput
Figure 7: Overall performance across all clients. Total transmission rate (a) shows that the total (average)
link rate sum is similar. However, total queue lengths (b) and throughputs (c) clearly show that DistGreedy
outperforms the IEEE 802.11 DCF.
36
24
18
12
9
6
DistGreedy
802.11
0
60
120
180
240
Time (sec)
(a) Transmission rate
4
DistGreedy
802.11
Throughput (Mbps)
Queue length (pkts)
Data rate (Mbps)
100
54
48
75
50
25
0
300
DistGreedy
802.11
3
2
1
0
0
60
120
180
240
300
0
Time (sec)
(b) Queue length
60
120
180
240
300
Time (sec)
(c) Throughput
Figure 8: Performance of Client 3. Similar results as in Fig. 7 are observed when we focus on the performance
of a client.
these changes are not shown in the figures due to averaging.
Further the link rate is chosen by the hardware physical layer
depending on the channel state at a given time. We have
observed that transmission rate changes frequently and often in an unpredictable manner. Since the transmission rate
is not under our control, it is difficult to maintain exactly
the same channel environment when we compare two different MAC protocols. This is the reason that DistGreedy
and IEEE 802.11 DCF have different link rates in Figs. 7(a)
and 8(a). Nonetheless, the figures show that overall link
rates are similar for both cases. We may force the hardware
to use a fixed transmission rate at the transmitter. However,
in such a case, we may see frequent transmission failures due
to insufficient SINR at the receiver.
Fig. 7 shows that our DistGreedy implementation achieves
better network performance in terms of reduced total queue
length (Fig. 7(b)) and total throughput performance (Fig. 7(c))
under similar channel states. Indeed, DistGreedy implementation maintains queue lengths low for all the three clients,
and IEEE 802.11 DCF results in many drops due to buffer
overflows. For example, the queue length of Client 3 frequently increases up to 100 under IEEE 802.11 DCF even
through it does not show up in Fig. 8 due to exponential
weighted time averaging.
In Figs. 8(a) and 8(b), we can observe that under IEEE
802.11 DCF, high link rate (i.e., in [60, 120] and [180, 240])
does not lead to low queue lengths, since IEEE 802.11 DCF
does not opportunistically exploit wireless fading. In contrast, it shows that the DistGreedy implementation successfully keeps the queue length low, especially when the link
rate is high. This implies that DistGreedy can account
for the channel variations, and thus takes the advantage
of the opportunistic gains. Another interesting observation
is that in Fig. 8(c), IEEE 802.11 DCF often suffers from
poor throughput performance when the server moves, i.e.,
after 120 and 240 seconds, while DistGreedy implementation
maintains high throughput performance during the moves.
6. CONCLUSION
In this paper, we develop a distributed scheduling scheme
that is provably efficient under wireless fading. By taking a
local greedy approach, we prove that our scheme is a ∆1∗ approximation to the Maximum Weighted Independent Set
problem, where ∆∗ is the maximum conflict degree, and
has O(log |V |) complexity (or polylogarithmic complexity),
where |V | is the number of links.
We evaluate our scheme through simulations in grid networks and random networks. The results show that our
distributed scheduling scheme is insensitive to parameter
settings, and achieves throughput and delay performance
similar to those of the optimal solution. We also implement
our scheme with hardware by modifying the existing IEEE
802.11 DCF. The experimental results show that our modification results in better throughput performance with low
queue length by taking into account time-varying link capacities.
7. ACKNOWLEDGMENTS
This work has been partially supported by NSF grants
CNS-1012700 and CNS-0643145, and a MURI grant from
the Army Research Office W911NF-08-1-0238, and in part
by the Basic Science Research Program through the NRF of
Korea, funded by the Ministry of Science, ICT, and Future
Planning (No. 2011-0008549).
8.
REFERENCES
[1] ALIX system boards.
http://pcengines.ch/alix.htm.
[2] Atheros Linux Wireless Drivers. http:
//wireless.kernel.org/en/users/Drivers/ath5k.
[3] Voyage Linux. http://linux.voyage.hk.
[4] S. Basagni. Finding a Maximal Weighted Independent
Set in Wireless Networks. Telecommunication Systems,
18:155–168, 2001.
[5] B. Birand, M. Chudnovsky, B. Ries, P. Seymour,
G. Zussman, and Y. Zwols. Analyzing the
Performance of Greedy Maximal Scheduling via Local
Pooling and Graph Theory. IEEE/ACM Trans. Netw.,
20(1), Feburary 2012.
[6] L. Bui, S. Sanghavi, and R. Srikant. Distributed Link
Scheduling with Constant Overhead. IEEE/ACM
Trans. Netw., 17(5):1467–1480, October 2009.
[7] P. Chaporkar, K. Kar, X. Luo, and S. Sarkar.
Throughput and Fairness Guarantees Through
Maximal Scheduling in Wireless Networks. IEEE
Trans. Inf. Theory, 54(2):572–594, February 2008.
[8] J. Ghaderi and R. Srikant. Effect of Access
Probabilities on the Delay Performance of Q-CSMA
Algorithms. In IEEE INFOCOM, April 2012.
[9] P. Gupta and P. R. Kumar. The Capacity of Wireless
Networks. IEEE Trans. Inf. Theory, 46(2):388–404,
March 2000.
[10] J.-H. Hoepman. Simple Distributed Weighted
Matchings. eprint, October 2004.
[11] L. Jiang and J. Walrand. A Distributed CSMA
Algorithm for Throughput and Utility Maximization
in Wireless Networks. IEEE/ACM Trans. Netw.,
18(13):960–972, June 2010.
[12] C. Joo. On Random Access Scheduling for Multimedia
Traffic in Multi-hop Wireless Networks, 2012. to
appear in IEEE Trans. Mobile Computing.
[13] C. Joo, G. Sharma, N. B. Shroff, and R. R.
Mazumdar. On the Complexity of Scheduling in
Wireless Networks. EURASIP Journal of Wireless
Communications and Networking, October 2010.
[14] C. Joo and N. B. Shroff. Local Greedy Approximation
for Scheduling in Multi-hop Wireless Networks. IEEE
Trans. Mobile Computing, 11(3):414–426, March 2012.
[15] E. Leonardi, M. Mellia, F. Neri, and M. A. Marsan.
On the Stability of Input-Queued Switches with
Speed-Up. IEEE/ACM Trans. Netw., 9(1), Feburary
2001.
[16] B. Li and A. Eryilmaz. A Fast-CSMA Algorithm for
Deadline Constraint Scheduling over Wireless Fading
Channels. In Workshop on Research Allocation and
Cooperation in Wireless Networks (RAWNET), May
2011.
[17] X. Lin and S. Rasool. Constant-Time Distributed
Scheduling Policies for Ad Hoc Wireless Networks.
IEEE Trans. Autom. Control, 54(2):231–242, Feburary
2009.
[18] X. Lin and N. B. Shroff. The Impact of Imperfect
Scheduling on Cross-Layer Congestion Control in
Wireless Networks. IEEE/ACM Trans. Netw.,
14(2):302–315, April 2006.
[19] X. Liu, E. K. P. Chong, and N. B. Shroff. A
Framework for Opportunistic Scheduling in Wireless
Networks. Computer Networks, 41(4):451–474, March
2003.
[20] M. Lotfinezhad and P. Marbach. Delay Performance of
CSMA Policies in Multihop Wireless Networks: A
New Perspective. In Information Theory and
Application Workshop, Feburary 2010.
[21] E. Modiano, D. Shah, and G. Zussman. Maximizing
Throughput in Wireless Networks via Gossiping.
Sigmetrics Performance Evaluation Review,
34(1):27–38, 2006.
[22] M. J. Neely, E. Modiano, and C. E. Rohrs. Dynamic
Power Allocation and Routing for Time-varying
Wireless Networks. IEEE J. Sel. Areas Commun.,
23(1), 2005.
[23] J. Ni, B. Tan, and R. Srikant. Q-CSMA:
Queue-Length Based CSMA/CA Algorithms for
Achieving Maximum Throughput and Low Delay in
Wireless Networks. IEEE/ACM Trans. Netw., 20(3),
June 2012.
[24] S. Sakai, M. Togasaki, and K. Yamazaki. A Note on
Greedy Algorithms for the Maximum Weighted
Independent Set Problem. Discrete Appl. Math.,
126(2-3):313–322, March 2003.
[25] S. Sarkar and L. Tassiulas. End-to-end Bandwidth
Guarantees Through Fair Local Spectrum Share in
Wireless Ad-hoc Networks. In IEEE CDC, pages
564–569, December 2003.
[26] G. Sharma, C. Joo, N. B. Shroff, and R. R.
Mazumdar. Joint Congestion Control and Distributed
Scheduling for Throughput Guarantees in Wireless
Networks. ACM Trans. Model. and Comput. Simul.,
21(1):5:1–5:25, December 2010.
[27] L. Tassiulas and A. Ephremides. Stability Properties
of Constrained Queueing Systems and Scheduling
Policies for Maximal Throughput in Multihop Radio
Networks. IEEE Trans. Autom. Control,
37(12):1936–1948, December 1992.
[28] P.-J. Wan, O. Frieder, X. Jia, F. Yao, X. Xu, and
S. Tang. Wireless Link Scheduling under Physical
Interference Model. In IEEE INFOCOM, April 2011.
[29] X. Wu and R. Srikant. Scheduling Efficiency of
Distributed Greedy Scheduling Algorithms in Wireless
Networks. In IEEE INFOCOM, April 2006.
[30] S. Yun, J. Shin, and Y. Yi. Medium Access over
Time-varying Channels with Limited Sensing Cost.
CoRR, abs/1206.5054, 2012.